H A D | key.c | 552 u_int8_t satype, 3278 u_int8_t satype, 3324 satype, 3897 u_int8_t satype, 3994 if (satype == SADB_SATYPE_ESP) { 4137 /* check satype */ 4183 ipseclog((LOG_DEBUG, "key_mature: Invalid satype.\n")); 4293 u_int8_t satype, 4310 m = key_setsadbmsg(type, 0, satype, seq, pid, sav->refcnt); 4444 u_int8_t satype, 3277 key_newsav2(struct secashead *sah, u_int8_t satype, u_int8_t alg_auth, u_int8_t alg_enc, u_int32_t flags, u_int8_t replay, struct sadb_key *key_auth, u_int16_t key_auth_len, struct sadb_key *key_enc, u_int16_t key_enc_len, u_int16_t natt_port, u_int32_t seq, u_int32_t spi, u_int32_t pid, struct sadb_lifetime *lifetime_hard, struct sadb_lifetime *lifetime_soft) argument 3896 key_setsaval2(struct secasvar *sav, u_int8_t satype, u_int8_t alg_auth, u_int8_t alg_enc, u_int32_t flags, u_int8_t replay, struct sadb_key *key_auth, u_int16_t key_auth_len, struct sadb_key *key_enc, u_int16_t key_enc_len, u_int16_t natt_port, u_int32_t seq, u_int32_t spi, u_int32_t pid, struct sadb_lifetime *lifetime_hard, struct sadb_lifetime *lifetime_soft) argument 4290 key_setdumpsa( struct secasvar *sav, u_int8_t type, u_int8_t satype, u_int32_t seq, u_int32_t pid) argument 4441 key_setsadbmsg( u_int8_t type, u_int16_t tlen, u_int8_t satype, u_int32_t seq, pid_t pid, u_int16_t reserved) argument 5656 key_satype2proto( u_int8_t satype) argument 6828 u_int8_t satype; local 7210 u_int8_t satype; local 7853 int satype; local 8062 u_int8_t satype; member in struct:sav_dump_elem 8076 u_int8_t satype; local [all...] |